Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Infosec Crossroads

Cooper via YouTube

Overview

Explore a thought-provoking conference talk that challenges the reactive nature of information security defenses. Delve into the evolution of attacks and offensive techniques over the past 16 years, from One-Way Web Hacking in 2001 to Stegosploit in 2016. Examine how defense strategies have consistently lagged behind emerging threats, and discover why it's time for a paradigm shift in security architecture. Learn about the basics of a proactive defense approach that could revolutionize the field. Gain insights from Saumil Shah, an internationally recognized security expert, as he shares his extensive experience and proposes innovative solutions to combat modern cyber threats. Understand the changing landscape of attack targets, motivations, and techniques, including DDOS, breaches, and browser exploits. Critically analyze current practices such as bug bounties and compliance measures, and explore the potential of advanced technologies like machine learning in cybersecurity. Discover the value of historical data, intelligence gathering, and proactive security testing in building a more robust defense strategy. Examine the concept of user hardening efforts and the importance of metrics in shifting the security curve. Gain a comprehensive understanding of the challenges facing the infosec industry and the potential pathways to a more secure digital future.

Syllabus

Intro
The Thought Process
The Attacks Evolve
Targets Have Shifted
Motivation
DDOS
Breaches
Perimeter
Hacks Happen
Browser Exploit
Nakatomi Space
Black Hat 2003
Exploits
Bug bounties
The problem with bug bounties
Dont play this game
How users behave
Advanced technology
User safety
User choice
Reactive approach
Compliance
The Golden Truth
Infosec Defense
Machine Learning
Stop 99 of malware
One percent of malware
We have to change
Intelligence
Proactive Security Testing
Collect everything
Our customers
Historical data
Moores law
The value of historical data
Battle of Two Narratives
Red Team
Who are you scared of
User ratings
User hardening efforts
Metrics
Shift the curve
Booby traps
Analysis decides actions
Block diagrams
Tracking
Blueprint
Buying from the top
Compliance and audits
Creativity
Business Value

Taught by

Cooper

Reviews

Start your review of The Infosec Crossroads

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.